Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies BCS Products Security Handbook
Lucent Technologies BCS Products Security Handbook
Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 171
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-39 MERLIN LEGEND Communications System 5 nEnter # in the Subscriber Password field to prevent access to the corresponding voice mail. nEnter yes in the Does the subscriber have switch call coverage field. On the switch side, do not specify the AUDIX Voice Power System extension as a coverage point for any of these added extensions. NOTE: Although these restricted voice mailboxes cannot receive Call...
Page 172
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-40 MERLIN LEGEND Communications System 5 Security Tips nAt the switch, assign toll restrictions to voice message system and automated attendant ports. nIf you do not use the outcalling features of the voice messaging system, restrict the outward calling capability of all voice ports. nUse a dial plan that does not allow extensions beginning with the same digits as ARS, TAC, or verification and test...
Page 173
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-41 MERLIN LEGEND Communications System 5 2. If Step 1 is successful, the voice mail system performs a switch-hook flash, putting the caller on hold. NOTE: If Step 1 is unsuccessful, the voice mail system plays an error message and prompts the caller for another try. 3. The voice mail system sends the digits to the switch. 4. The voice mail system completes the transfer. With Basic Call Transfer, a...
Page 174
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-42 MERLIN LEGEND Communications System 5 Restrict Outcalling Outcalling uses the voice messaging ports. If mailbox security is broken, unauthorized persons can use outcalling to transfer messages at your expense. If you need outcalling, restrict it as far as possible to eliminate the possibilities for theft of services. nDo not enable outcalling at all if you do not need it. Do not enable outcalling...
Page 175
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-43 MERLIN LEGEND Communications System 5 Protecting the MERLIN MAIL, MERLIN MAIL-ML, MERLIN MAIL R3, and MERLIN LEGEND Mail Voice Messaging Systems The MERLIN MAIL, MERLIN MAIL-ML, MERLIN MAIL R3, and MERLIN LEGEND Mail Voice Messaging Systems provide automated attendant, call answer, and voice mail functionality. The automated attendant feature answers incoming calls and routes them to the appropriate...
Page 176
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-44 MERLIN LEGEND Communications System 5 Take the following preventative measures to limit the risk of unauthorized use of the automated attendant feature by hackers: nDo not use automated attendant selector codes for Automatic Route Selection (ARS) codes or Pooled Facility codes. nAssign all unused automated attendant selector codes to zero, so that attempts to dial these will be routed to the system...
Page 177
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-45 MERLIN LEGEND Communications System 5 Hackers may also use a computer to dial an access code and then publish the information for other hackers. Substantial charges can accumulate quickly. It is your responsibility to take appropriate steps to implement the features properly, to evaluate and administer the various restriction levels, and to protect and carefully distribute access codes. To reduce...
Page 178
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-46 MERLIN LEGEND Communications System 5 nSet the maximum number of digits in an extension parameter appropriate to your dial plan. The voice messaging system will not perform transfers to extensions greater than that number. nWhen possible, restrict the off-network capability of callers by using calling restrictions, Facility Restriction Levels, and Disallowed List features. nOutward restrict all...
Page 179
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-47 MERLIN LEGEND Communications System 5 Additional MERLIN MAIL R3 and MERLIN LEGEND Mail Voice Messaging System Security Features The MERLIN MAIL R3 and MERLIN LEGEND Mail Voice Messaging System includes the following additional security features: nThe Transfer to Registered Subscribers Only setting of the Transfer Restrictions feature allows callers to be transferred only to users who have...
Page 180
BCS Products Security Handbook 555-025-600 Issue 6 December 1997 Voice Messaging Systems Page 5-48 PARTNER II Communications System 5 option otherwise. It is strongly discouraged to administer a system without Security Violation Notification. The System Administrator should investigate all warning messages received. PARTNER II Communications System The PARTNER II Communications System R3, and later releases, supports the PARTNER MAIL System. The PARTNER II Communications System R3.1 and later...